SlideShare a Scribd company logo
1 of 23
| By Rahul Sah
Agenda
1.Introduction
2.Threats
3.Prevention
1
Computer security has been a topic of great
importance since the emergence of second generation
main frame computers (early 1960's).
More than one dishonest programmer developed
software which would accumulate the inaccuracy of
each account transaction into a single account.
The losses were not noticed on individual accounts,
but were later noticed at the institutional level.
Threats2
Internet emerged to the world in the early 21st
century(1990s). It started with a few group of
peoples and now it is a community of billions
people.
Like the faces of a coin, Internet has also got its
demerit. It is the most suitable platform for
Hijackers, attackers, to spread their threats.
The threats can be in the form of Virus, Malwares,
Trojans, etc.
Add Text, an Image, or Both
Spyware refers to programs that surreptitiously monitor
activity on a computer system and report that information
to others without the user's consent.
Malware, short for malicious
software, is any software
used to disrupt computer
operation, gather sensitive
information, or gain access to
private computer systems.
Computer Viruses are programs
that can replicate their
structures or effects by infecting
other files or structures on a
computer. The common use of a
virus is to take over a computer
to steal data.
A Trojan horse, commonly known as a Trojan, is a general term
for malicious software that pretends to be harmless, so that a user
willingly allows it to be downloaded onto the computer.
Ransomware is a type of malware which restricts access
to the computer system that it infects, and demands a
ransom paid to the creator(s) of the malware in order for the
restriction to be removed.
KeyLogger, Keystroke logging, often referred to
as key logging or keyboard capturing, is the action of
recording (logging) the keys struck on a keyboard.
Prevention3
“Prevention
is
better than Cure . ”
Avoid exposure to unauthenticated access,
unnecessary access to employees or users.
Install tools like anti malware, anti phishing
for scanning to detect vulnerabilities.
Install updated version of antivirus tool.
Guard the walls of the server with updated
firewalls.
Do not click blindly on the hyperlinks appearing in the
e-mail that came from the unknown sources.
Always look for the “https:” before trusting the
website especially, before providing credit card
information and personal information.
Be very much careful before downloading any content
from the suspicious or even from the unsecured
website.
Ignore clicking on the ad links as these behaviours
are marked by the spywares and further leads to
unknown threats.
Beware of downloading applications, files (mp3,
mp4, gif, etc) from the sites and also from the
attachments of the e-mails.
Use/buy certified and secured products from
the vendors.
Keep a habit of regularly scanning the system
also keep updating the virus scanning
tools/software.
STATISTICS
General Trends of 2017
1. In Quarter 3, 2016 alone, 18 million new malware
samples were captured.
(Source: Panda Labs)
2. More than 4,000 ransomware attacks have occurred every
day since the beginning of 2016.
(Source: Computer Crime and Intellectual Property Section
(CCIPS))
3. The amount of phishing emails containing a form of
ransomware grew to
97.25% during Q3 2016, up from 92% in Q1 2016.
(Source: PhishMe 2016 Q3 Malware Review)
4. 78% of people claim to be aware of the risks of unknown links in
emails. And yet they click anyway.
(Source: Friedrich-Alexander University (FAU))
5. 52% of organizations that
suffered successful cyber
attacks in 2016 aren't making
any changes to their security in
2017
(Source: Barkly, December 2016,
Security Confidence Headed Into
2017)
References :
1. https://blog.barkly.com/cyber-security-statistics-
2017
2. https://www.clickssl.net/blog/types-of-internet-
security-threats-and-preventions/
3.
• https://h30657.www3.hp.com/t5/BusinessBlog-
en/35-cyber-security-statistics-every-CIO-should-
know-in-2017/ba-p/8278
• https://resource.elq.symantec.com/LP=3980?cid=70
138000001BjppAAC&mc=202671&ot=wp&tt=sw&ini
d=symc_threat-
report_regular_to_leadgen_form_LP-3980_ISTR22-
report-main
THANK YOU!

More Related Content

What's hot

Computer networking and E-commerce
Computer networking and E-commerce Computer networking and E-commerce
Computer networking and E-commerce Haroon Khaliq
 
What is WHOIS?
What is WHOIS?What is WHOIS?
What is WHOIS?ICANN
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Webnorzaini
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 

What's hot (20)

Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer networking and E-commerce
Computer networking and E-commerce Computer networking and E-commerce
Computer networking and E-commerce
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What is WHOIS?
What is WHOIS?What is WHOIS?
What is WHOIS?
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Web
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 

Similar to Seminar on Internet security

Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 

Similar to Seminar on Internet security (20)

Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Information security
Information securityInformation security
Information security
 
Malware
MalwareMalware
Malware
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
185
185185
185
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
MALWARE
MALWAREMALWARE
MALWARE
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Seminar on Internet security

  • 3. 1
  • 4. Computer security has been a topic of great importance since the emergence of second generation main frame computers (early 1960's). More than one dishonest programmer developed software which would accumulate the inaccuracy of each account transaction into a single account. The losses were not noticed on individual accounts, but were later noticed at the institutional level.
  • 6. Internet emerged to the world in the early 21st century(1990s). It started with a few group of peoples and now it is a community of billions people. Like the faces of a coin, Internet has also got its demerit. It is the most suitable platform for Hijackers, attackers, to spread their threats. The threats can be in the form of Virus, Malwares, Trojans, etc.
  • 7. Add Text, an Image, or Both
  • 8. Spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent.
  • 9. Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
  • 10. Computer Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data.
  • 11. A Trojan horse, commonly known as a Trojan, is a general term for malicious software that pretends to be harmless, so that a user willingly allows it to be downloaded onto the computer.
  • 12. Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
  • 13. KeyLogger, Keystroke logging, often referred to as key logging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard.
  • 16. Avoid exposure to unauthenticated access, unnecessary access to employees or users. Install tools like anti malware, anti phishing for scanning to detect vulnerabilities. Install updated version of antivirus tool. Guard the walls of the server with updated firewalls.
  • 17. Do not click blindly on the hyperlinks appearing in the e-mail that came from the unknown sources. Always look for the “https:” before trusting the website especially, before providing credit card information and personal information. Be very much careful before downloading any content from the suspicious or even from the unsecured website. Ignore clicking on the ad links as these behaviours are marked by the spywares and further leads to unknown threats.
  • 18. Beware of downloading applications, files (mp3, mp4, gif, etc) from the sites and also from the attachments of the e-mails. Use/buy certified and secured products from the vendors. Keep a habit of regularly scanning the system also keep updating the virus scanning tools/software.
  • 20. 1. In Quarter 3, 2016 alone, 18 million new malware samples were captured. (Source: Panda Labs) 2. More than 4,000 ransomware attacks have occurred every day since the beginning of 2016. (Source: Computer Crime and Intellectual Property Section (CCIPS)) 3. The amount of phishing emails containing a form of ransomware grew to 97.25% during Q3 2016, up from 92% in Q1 2016. (Source: PhishMe 2016 Q3 Malware Review)
  • 21. 4. 78% of people claim to be aware of the risks of unknown links in emails. And yet they click anyway. (Source: Friedrich-Alexander University (FAU)) 5. 52% of organizations that suffered successful cyber attacks in 2016 aren't making any changes to their security in 2017 (Source: Barkly, December 2016, Security Confidence Headed Into 2017)
  • 22. References : 1. https://blog.barkly.com/cyber-security-statistics- 2017 2. https://www.clickssl.net/blog/types-of-internet- security-threats-and-preventions/ 3. • https://h30657.www3.hp.com/t5/BusinessBlog- en/35-cyber-security-statistics-every-CIO-should- know-in-2017/ba-p/8278 • https://resource.elq.symantec.com/LP=3980?cid=70 138000001BjppAAC&mc=202671&ot=wp&tt=sw&ini d=symc_threat- report_regular_to_leadgen_form_LP-3980_ISTR22- report-main